Search Results - (( web application design algorithm ) OR ( iot applications matching algorithm ))
Search alternatives:
- applications matching »
- application design »
- design algorithm »
- iot applications »
- web application »
-
1
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…But in dense IoT applications, much more than two tags can constitute a collision slot. …”
Get full text
Get full text
Article -
2
Lightweight ontology architecture for QoS aware service discovery and semantic CoAP data management in heterogeneous IoT environment
Published 2026“…User requests, transmitted via the Constrained Application Protocol (CoAP), are semantically enriched and matched to QoS parameters using Dynamic Shannon Entropy optimized with the Salp Swarm Algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
4
IoT Technology Enabled Heuristic Model with Morlet wavelet neural network for numerical treatment of Heterogeneous Mosquito Release Ecosystem
Published 2021“…The utmost advancements of artificial neural networks (ANNs), software-defined networks (SDNs) and internet of things (IoT) technologies find beneficial in different applications of the smart healthcare sector. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
6
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
7
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
8
A technique of dispatching algorithms for web-server cluster
Published 2011Get full text
Working Paper -
9
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The Web Application System program is designed for the client to configure a system (e.g calculates a load flow). …”
Get full text
Get full text
Thesis -
10
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
11
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
12
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
13
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
14
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
15
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
16
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. …”
Get full text
Get full text
Get full text
Article -
17
Web application vulnerabilities detection model
Published 2016“…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
Get full text
Get full text
Research Reports -
18
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
Get full text
Get full text
Thesis -
19
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Advanced mining processes are needed for this knowledge to be extracted, understood and used. Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing the data representing usage data about a particular Web site. …”
Get full text
Get full text
Article -
20
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis
